Videos from Shmoocon 2015, held in Washington DC, January 16-18, 2015. These are the full videos recorded and available from the event, put into one item to allow playlisting. Individual talk items are currently available as well.
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer. Topics: ohm2013, noisysquare, raid
Controlling USB Flash Drive Controllers: Expose of Hidden Features Richard Harman With stories of "BadBIOS" infecting PCs simply by connecting a malicious USB flash drive to a PC, it's time we learned about flash drives and their controllers. Consumer USB flash drives are cheap, growing in capacity and shrinking in physical size. There are only around 15 prominent controller chip manufacturers whom you have never heard of, but OEM for all the popular and respected "name...
Screening of cult film "Breaking the Taboo" - a documentary uncovering the failure of the UN sanctioned war on drugs followed by Q&A with Countess Amanda Fielding of the Beckley Foundation, Annie Machon of Law Enforcement Against Prohibition (LEAP), and John Gilmore The War on Drugs has failed. After 50 years of prohibition, illicit drugs are now the third most valuable industry in the world after food and oil, all in the control of criminals. Drugs are cheaper and more available... Topics: OHM2013, talk, Amanda Fielding, Annie Machon, John Gilmore, screening, beckley foundation, LEAP,...
Every month for eight years a warez compilation disc was released under the name Twilight. Selling over 60.000 each month, not getting caught and transforming from piece of art to shrinkwrap. From the mid-ninenties to the early 2000's a warez compilation cd was released under the name Twilight. It featured the latest and greatest in games and applications and was sold for 25 Dutch guilders via friends and collegues. With a total of 89 volumes and absolute secrecy, it's a challenge to find how... Topics: OHM2013, talk, Elger Jonker, Twilight, warez
During the preview evening of Notacon 6 in Cleveland, Ohio, Jason Scott, a frequent presenter at Notacon and other events, offered to give a presentation on the art of presenting. Subjects covered include motivation, performance, content, common pitfalls, frequent harbingers of narrative/presentation doom, and memories of presentations gone right and wrong. The speech was recorded with a static hi-def recorder, so Jason does walk offscreen or get cut off at various junctions, but his voice... ( 1 reviews ) Topics: presentation, jason scott, notacon
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer. Topics: ohm2013, noisysquare, tor
Presented at Notacon 6 in Cleveland, OH on April 17, 2009. Jason Scott walks through the context and playing of Super Mario 64, the Mario Brothers launch title accompanying the Nintendo 64. Talks about the growing field of "Platform Studies", the lessons learned from the unique situation of Super Mario 64, and describes ways that modern programmers and coders can learn from the approach taken to the relatively new general experience of the 3D Platformer in 1996. Recorded by Tedd St.... ( 1 reviews ) Topics: nintendo, mario, jason scott, notacon, blockparty, cleveland
Presented at The Last Hope, Hotel Pennsylvania, New York City, NY. Historian Jason Scott covers a broad range of hacker history subjects, focusing on providing the tools for understanding the context of hacking and computer history. Subjects covered include 1800-era hacker cons, myths in the Hacker "story", names and events likely forgotten, and some of the touchstones of what hackers consider their lore. Topics: Hacking, phreaking, jason scott
A View about mechanical/electronic Masterkey Systems that use at your home, in comercial installations and even critical public infrastructure. Analyse of possible attaks and masterkey generation. Take a view to the technical Background of mechanic and electronic Masterkey Systems. A detailed view different Variants of mechanical construction of these systems, advance and disadvance. Generation of the Masterkey without knowing it's mechanical data, defeats the security of obscurity, what is the... Topics: OHM2013, talk, security, masterkey, RFguy
Introducing idb - Simplified Blackbox iOS App Pentesting Daniel A. Mayer More than ever, mobile apps are used to manage and store sensitive data by both corporations and individuals. In this talk, we review common iOS mobile app flaws involving data storage, inter-process communication, network communications, and user input handling as seen in real-world applications. To assist the community in assessing security risks of mobile apps, we introduce a new tool called 'idb' and show how it can be...
Privacy and anonymity are hard to come by these days. What's worse, many if not most, of the world's network users don't have the slightest idea of the levels of monitoring to which they are subjected, much less the proper chain of steps necessary to strengthen their communications channels. While there are applications and systems that provide heightened anonymity and confidentiality to users, all require user-knowledge of configuration and proper systems administration techniques. The tiniest...
Jason Scott, free-range archivist at the Internet Archive, gives a free-wheeling overview of the software collection at archive.org, what parts of his life led him to that position, and what the software collection is trying to achieve. Presented in a windy tent at the Vintage Computer Festival East 9.1, in Wall, NJ on April 4, 2014. Jason says "It was windy, we were in a tent, I had no laptop working and no working screen, so the whole presentation is one hour of 'winging it'. I... Topics: jason scott, internet archive, software
byChristopher Truncer, Will Schroeder, and Michael Wright
AV Evasion With the Veil Framework Christopher Truncer, Will Schroeder, and Michael Wright As antivirus (finally) has started to slowly increase in effectiveness, more and more of the payloads used during penetration tests are being caught. While the industry as a whole has demonstrated its capabilities of bypassing AV solutions in nearly all situations, valuable assessment time is often lost. The Veil-Evasion Framework (Veil) was developed to solve this problem by offering a modular,...
dojocon, hacking, security http://Dojocon.org http://hackerspaces.org/wiki/Reverse_Space Tiffany Strauchs Rad, @tiffanyrad International Cyber Jurisdiction: âKill Switchingâ Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping John Strauchs, @strauchs Security and IT Convergence Richard Goldberg, @GoldbergLawDC Rules of Engagment: Mitigating Risk in Information Security Work Jon McCoy Ninja Patching .NET Marco Figueroa, @marcofigueroa & Kevin Figueroa Detecting &... Topics: dojocon, hacking, security
I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things! Nicholas Popovich This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope. This will be a discussion of a recent independent research project that eventually led to an information disclosure vulnerability by a major U.S. ISP. This is also an example of when a...
RPC Auditing Tools and Techniques Aaron Portnoy, Cody Pierce, TippingPoint Security Research Team RPC auditing is currently a tedious and manual process. When complex embedded structures, arrays, and unions are present in an IDL, coding the client involves much debugging and time. The discussed tools are the culmination of a few weeks worth of research performed by Aaron Portnoy and Cody Pierce that allow a researcher to very quickly be able to communicate and audit an RPC server. Functionality... Topics: deepsec, hacker, conference, anarchivism
Presentation of the open source access system that ist used on the muCCC location. Give an Overview of munich chapter access control, schemtic of the universal Lock controller, that can control a wide variation of door locks. Information about the Lockbus protocol, one mastercontroller handle the commands of SSH host for user access. Software structure Know issuesProgram event page: https://program.ohm2013.org/event/58.html Topics: OHM2013, talk, RFguy, open source, access control, hackerspace, muCCC
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer. Topics: ohm2013, noisysquare, activism
GNURadio as a signal processing prototyping tool for becoming familiar with analog and digital communication methods. We demonstrate the use of this software environment for implementing new digial communication mode decoding algorithms, qualifying low frequency circuits by using the audio card as a network analyzer, all the way to developing a FMCW RADAR. Radiofrequency communication has become ubiquoutous in the daily life of most of the western and south east asian population. Nevertheless,... Topics: OHM2013, talk, jmfriedt, Jean-Michel Friedt, ACARS, DVB, radio, FMCW RADAR, GNURadio, WTH, WTH2005,...
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer. Topics: ohm2013, noisysquare, privacy